NIST's Ron Ross sees the cloud as helping to reduce the complexity of keeping data secure. But security expert Eugene Spafford of Purdue University offers a different viewpoint in the first part of a two-part joint interview.
NIST's Ron Ross sees complexity as the biggest risk enterprises face. To ease risk, Ross favors moving data to the cloud. Purdue's Eugene Spafford doesn't fully subscribe to Ross' plan. The two square off in this interview.
Organizations outsourcing card data management to the cloud face significant security risks. How should they prioritize risks when reviewing cloud-vendor solutions? The PCI Council's Bob Russo offers insight.
Organizations looking at implementing encryption should consider taking a unified approach, says Karen Scarfone, who coauthored NIST's encryption guidance. Learn about her other recommendations.
Because data stored in a cloud-based "sandbox" environment for testing purposes is vulnerable, it should be masked to protect sensitive information, says Karen Hsu of Informatica.
The growth in cloud computing and mobility is creating a need for a streamlined, centralized process for managing user authentication, says Sarah Fender of PhoneFactor.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
Given the expanse of mobility and the cloud, traditional identity and access management solutions no longer suffice. It's time for a complete business-driven IAM solution, says Jason Garbis of Aveksa.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Barracuda Networks announces the release of a firewall designed to meet the needs of small and mid-sized organizations. Read more about this and other news releases issued at RSA Conference 2013.
Russ Dietz of Websense likes to ask organizations: Do you really know who has access to your data? The answers often lead to uncovering security vulnerabilities that have been overlooked.
Advanced threats require an advanced security strategy. Oliver Friedrichs of Sourcefire recommends a threat-centric security approach. In this interview, he explains exactly what that entails.
Paige Leidig, chief marketing officer of CipherCloud, says information protection requirements continue to be the primary hurdle for enterprise adoption, despite explosive growth in the cloud content and collaboration market and its evident advantages to productivity and cost efficiencies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.